Skip to main content

Phase 6: Coverage Matrix

28 ATT&CK techniques documented across all sources: 21 formalized into the procedure dataset, 7 from the broader source analysis without procedures written.

Of the 21 techniques in the procedure dataset:

  • 16 techniques (76%) — score 5, fully lab-validated with Kibana proof
  • 1 technique (5%) — score 4, lab-validated, single-source (corroborate before production)
  • 3 techniques (14%) — score 3, detection written but validation incomplete or failed
  • 1 technique (5%) — score 0, in procedures but no detection written (T1534)

Plus 7 techniques from the source set with no detection coverage (see Zero-Coverage table below).

Effective coverage (score ≥ 4): 17/21 procedure techniques (81%)

The Six Capability Gates

These capability gates determine your effective coverage floor:

Capability GateUnlocksWithout It
PowerShell Script Block Logging (EID 4104)det_mw_0003 Rule B and det_mw_0009 Rules A/CDetection degrades to command-line heuristics only
Sysmon EID 10 (ProcessAccess)det_mw_0010 Rule A (tool-agnostic LSASS access)Falls back to binary name matching, misses custom dumpers
Sysmon EID 7 (ImageLoad)det_mw_0004 (DLL side-loading)DLL loads are completely invisible
DNS resolver logging (full QNAME)det_mw_0008b (DNS tunneling)Mori C2 channel is invisible
Network flow / proxy logsdet_mw_0007 Rule C and det_mw_0008aRMM and Telegram C2 network-layer coverage lost
Email gateway telemetry (SEG)det_mw_0001 full correlated logicEmail-to-endpoint correlation unavailable

ATT&CK Coverage by Tactic

TacticTechniqueScoreDetection
Initial AccessT1566.001 Spearphishing Attachment5det_mw_0001
Initial AccessT1566.002 Spearphishing Link5det_mw_0001
Initial AccessT1190 Exploit Public-Facing Application5det_mw_0002
ExecutionT1059.001 PowerShell5det_mw_0003
ExecutionT1027 Obfuscated Files or Information5det_mw_0003
ExecutionT1047 Windows Management Instrumentation5det_mw_0009
PersistenceT1574.002 DLL Side-Loading3det_mw_0004
PersistenceT1547.001 Registry Run Keys / Startup Folder5det_mw_0005
PersistenceT1053.005 Scheduled Task4det_mw_0006
Defense EvasionT1102 Web Service3det_mw_0008a
DiscoveryT1082 System Information Discovery5det_mw_0009
DiscoveryT1016 System Network Configuration Discovery5det_mw_0009
DiscoveryT1033 System Owner/User Discovery5det_mw_0009
DiscoveryT1518.001 Security Software Discovery5det_mw_0009
Command & ControlT1219 Remote Access Software5det_mw_0007
Command & ControlT1071.001 Web Protocols3det_mw_0008a
Command & ControlT1572 Protocol Tunneling5det_mw_0008b
Credential AccessT1003.001 LSASS Memory5det_mw_0010
Credential AccessT1003.004 LSA Secrets5det_mw_0010
Credential AccessT1003.005 Cached Domain Credentials5det_mw_0010

Zero-Coverage Techniques

Eight ATT&CK techniques have zero detection coverage. These are acknowledged in the coverage matrix, not hidden.

TacticTechniqueSourceNote
Initial AccessT1534 Internal Spearphishingproc_mw_0001In procedure dataset; requires compromised-account telemetry beyond project scope
Lateral MovementT1021.001 Remote Desktop ProtocolSource setNot formalized into a procedure
Lateral MovementT1550.002 Pass the HashSource setPost-exploitation, source set only
CollectionT1005 Data from Local SystemSource setNot formalized into a procedure
CollectionT1039 Data from Network Shared DriveSource setNot formalized into a procedure
ExfiltrationT1041 Exfiltration Over C2 ChannelSource setNot formalized into a procedure
ImpactT1486 Data Encrypted for Impact (DarkBit)INCD 2023DarkBit operation; outside MuddyWater core playbook scope
ImpactT1490 Inhibit System Recovery (shadow copy deletion)INCD 2023DarkBit operation; outside MuddyWater core playbook scope

The actor uses these techniques. The public source base documents them. The detection coverage does not exist in this iteration. The coverage matrix is a floor, not a ceiling.